Filters








14,866 Hits in 4.5 sec

SIP

Robert Sparks
2007 Queue  
The best ideas so far for protection against these unwanted intrusions are based on the following: provid- Session Initiation Protocol FOCUS SIP Basics and Beyond SIP is in a continual state of improvement  ...  Figure 1 shows the beginning of a session being established in a basic architecture. Note that the SIP signaling and the media traverse the network independently.  ...  For the past seven years, he has focused on designing and developing SIP-based IP communications systems.  ... 
doi:10.1145/1229899.1229909 fatcat:ko6eyugzlbdonpnrvaubkhuun4

Decentralizing SIP

David A. Bryan, Bruce B. Lowekamp
2007 Queue  
Since SIP is designed for establishing media sessions of any kind, it is also used for a variety of multimedia applications beyond VoIP, including IPTV, videoconferencing, and even collaborative video  ...  While registration is distributed in a P2PSIP deployment, basic call signaling is performed using conventional SIP.  ...  He was co-founder and CTO of Jasomi Networks, a pioneer in the SIP Session Border Controller market, and he previously worked for Cisco Systems and Vovida Networks.  ... 
doi:10.1145/1229899.1229910 fatcat:ggx7zb4lifcclatvqlwucpvuey

Making SIP make cents

Jason Fischl, Hannes Tschofenig
2007 Queue  
ACKNOWLEDGMENTS The authors would like to thank Cullen Jennings and Gyuchang Jun for their work on the SIP payment Internet draft, Jeff Hodges for his help with SAML, the IETF SIP-PING working group for  ...  We would also like to thank Layya Halawi, Matthias Gsottberger, and Marcos Dytz for their work on a prototype implementation of the approach outlined in the SIP payment Internet draft.  ...  A typical ITSP (Internet telephony service provider) that uses SIP focuses mainly on the delivery of basic services and the features of a telecommunications company, such as voicemail and call waiting.  ... 
doi:10.1145/1229899.1229911 fatcat:nlfkt5v6xbgmfhbmivlwrbu27e

A sip of tradition

Zoltán Ottó Fülöp
2016 Analecta Technica Szegedinensia  
Beyond that it can also be categorized as a food industrial heritage.  ...  The venue of the research is the 77th edition of the National Agriculture and Food Exhibition (henceforward: OMÉK), which is one of the biggest and oldest agrarian and food industrial event in Hungary  ...  The other intention was to aim the attention to the harmonious symbiosis of man and the environment and the consumption of products made from natural basic commodities.  ... 
doi:10.14232/analecta.2016.1.1-5 fatcat:hsf625r6izfe5bwstea4lfhcnm

System-in-package (SIP)

King L. Tai
2000 Proceedings of the 2000 conference on Asia South Pacific design automation - ASP-DAC '00  
SIP technology will unleash the innovations of designers and unlock the full potential of IC technology.  ...  The goal of SIP is to match or exceed SOC performance with lower cost. SIP technology platform that provides the needed integration is described.  ...  There are basically three classes of chips: CPU, ASIC and memory.  ... 
doi:10.1145/368434.368603 dblp:conf/aspdac/Tai00 fatcat:b4gai4odyre7vg6etpjf5bphtm

Prevention of Anomalous SIP Messages

Ming Yang Su, Chung Chun Chen
2013 International Journal of Future Computer and Communication  
The proposed defense mechanism will filter malformed messages inconsistent with SIP protocol and judge whether SIP server suffers any flooding attack.  ...  Once attack is detected, this study will immediately update the black-list on the SIP server and use the SIP server built-in function to block the online requests of specific users on the black-list.  ...  If it is beyond the threshold, the system will enter into the statistical state and conduct the Chi-square test. If it is beyond the Chi-square critical value, it is then regarded as an attack.  ... 
doi:10.7763/ijfcc.2013.v2.203 fatcat:nie2yvpz7bcmjkqclcixd32eoy

Sip Authentication Scheme Using Ecdh

Aytunc Durlanik, Ibrahim Sogukpinar
2007 Zenodo  
As for authentication and authorization purposes there are many approaches and considerations for securing SIP to eliminate forgery on the integrity of SIP messages.  ...  SIP (Session Initiation Protocol), using HTML based call control messaging which is quite simple and efficient, is being replaced for VoIP networks recently.  ...  Encryption based schemes are beyond the scope of this document.  ... 
doi:10.5281/zenodo.1077912 fatcat:b24cdny7zjh3pppzikcqzwekga

System-in-Package (SiP)

2021 Advancing Microelectronics Magazine  
Fiona Chen, and Leon Rao-for their help and support in performing the solder paste printing tests in their lab.  ...  In addition, we would like to acknowledge the support of the technology group at i3 Electronics in Binghamton, NY: John Millard, Michael Hyde, and Rick Wade for their support in solder ball attach and  ...  Systems for 5G and Beyond, Atlanta, GA, USA, August 2019.  ... 
doi:10.4071/2380-7016-48.2.1 fatcat:jvlvfn5usva4jgufeoq2j5nzju

The Session Initiation Protocol (SIP) [chapter]

2010 IP Telephony  
In order to facilitate a greater level of granularity and scalability for authorization in SIP, new mechanisms need to be defined.  ...  SIP defines various methods for performing authentication. Authorization, however, is not defined explicitly and is generally based on identity. This does not scale well in multi-domain scenarios.  ...  Privacy A very important issue in identity federation is the fact that some identity information will exit beyond the domain's firewall, and is consequently at least partially beyond the domain's control  ... 
doi:10.1002/9780470973080.ch3 fatcat:w2xmeutnefdpro4fytxwwkrvgu

Simulation of personalized services in SIP communications

Dongmei Jiang, Tet Hin Yeap, L. Logrippo
2005 Proceedings of ICSSSM '05. 2005 International Conference on Services Systems and Services Management, 2005.  
A web-based system is designed and implemented to simulate advanced services in a Session Initiation Protocol (SIP) environment, including system basic services and personalized services (policies).  ...  The simulation system presented in this paper clearly displays what CPL policies should be used for the provision of presence services and call-processing services.  ...  process SIP SUBSCRIBE and SIP NOTIFY [2] messages for presence related services.  ... 
doi:10.1109/icsssm.2005.1500224 fatcat:d53h7lrdjbfbxgxl5kzstiruie

A SIP Security Testing Framework

Hemanth Srinivasan, Kamil Sarac
2009 2009 6th IEEE Consumer Communications and Networking Conference  
In this paper we take a proactive approach and highlight the importance of testing SIP from a security perspective. We first give a brief introduction to some of the most common attacks on SIP.  ...  We then describe a framework to effectively test several security aspects of a SIP network and thereby help mitigate such attacks.  ...  EVALUATIONS In this section, we present the evaluations for a basic instantiation of our framework. Here we used SIPp [15] as our SIP entity module.  ... 
doi:10.1109/ccnc.2009.4784778 dblp:conf/ccnc/SrinivasanS10 fatcat:gqngwuz5lje5redrnz6svrgdoe

A SIP-based conference control framework

Petri Koskelainen, Henning Schulzrinne, Xiaotao Wu
2002 Proceedings of the 12th international workshop on Network and operating systems support for digital audio and video - NOSSDAV '02  
We identify the requirements for conference control and propose a component-based scalable conference control framework employing the Session Initiation Protocol (SIP) and the Simple Object Access Protocol  ...  Conference control has been an area of intensive research over the years but widely accepted robust and scalable solutions and standards are still lacking.  ...  The conference management component defines basic conference parameters such as name, type, subject and authentication information.  ... 
doi:10.1145/507670.507679 dblp:conf/nossdav/KoskelainenSW02 fatcat:7kbfaplgm5ckbct5vf5lfedxfa

A SIP-based conference control framework

Petri Koskelainen, Henning Schulzrinne, Xiaotao Wu
2002 Proceedings of the 12th international workshop on Network and operating systems support for digital audio and video - NOSSDAV '02  
We identify the requirements for conference control and propose a component-based scalable conference control framework employing the Session Initiation Protocol (SIP) and the Simple Object Access Protocol  ...  Conference control has been an area of intensive research over the years but widely accepted robust and scalable solutions and standards are still lacking.  ...  The conference management component defines basic conference parameters such as name, type, subject and authentication information.  ... 
doi:10.1145/507678.507679 fatcat:bebwx6ouxbcjti7yajcly6urlm

Managing Enterprise Clinical Trial listings with OnCore SIP

Harshita koranne Joe Stokes
2018 Zenodo  
The UF Health Cancer Center uses OnCore Study Information Portal (SIP) functionality to manage the publication of their active clinical trials on its public-facing website and its mobile applications.  ...  This discussion will include a discussion of the operational challenges that were encountered as well as details of the technical methods that were used to achieve a comprehensive and sustainable approach  ...  -IRB approval is required when a clinical trial website goes beyond directory listings with basic descriptive information • Search engine for Active Clinical Trials -powered by OnCore • Uses standard OnCore  ... 
doi:10.5281/zenodo.2537141 fatcat:5hrhhypl6vcrlfegxnqy5dv2ya

Distributed Self Fault-Diagnosis for SIP Multimedia Applications [chapter]

Kai X. Miao, Henning Schulzrinne, Vishal Kumar Singh, Qianni Deng
2007 Lecture Notes in Computer Science  
based on protocol and functional scripting and rules.  ...  DYSWIS (Do You See What I See), proposed in this paper, is peer-to-peer distributed management architecture for multimedia network and service management, characteristic of active fault probing and identification  ...  Such a standard is apparently beyond SNMP's capability.  ... 
doi:10.1007/978-3-540-75869-3_18 fatcat:4j6nx5ypmvfnvhh4u4gawxu3va
« Previous Showing results 1 — 15 out of 14,866 results